intro to computer ch 9

Unlock all answers in this set

Unlock answers
question
Which type of program would likely be used by investigators to record a potential suspects' Internet activities? Cookie Global positioning system Keystroke logger Web bug
answer
keystroke logger
question
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. Spyware Freeware Employee-monitoring software Cookies
answer
Employee-monitoring software
question
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account. Encryption Firewall Password Dictionary attack
answer
Dictionary attack
question
Free computer games and free screen saver programs are typical carriers of _______. DoS worms viruses Trojan horses
answer
trojan horses
question
This type of computer criminal creates and distributes malicious programs. Employee Hacker Cracker Keystroke logger
answer
cracker
question
The process of coding information to make it unreadable except to those who have a special piece of information known as a key. Restriction Security Protection Encryption
answer
Encryption
question
This law gives you the right to look at your personal records held by government agencies. Gramm-Leach-Bliley Act Freedom of Information Act Family Educational Rights and Privacy Act Computer Fraud and Abuse Act
answer
Freedom of Information Act
question
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. Illusion of anonymity Browser cache History files Privacy mode
answer
privacy mode
question
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. Worm Fake Virus Rogue
answer
Rogue
question
_______ is concerned with protecting software and data from unauthorized tampering or damage. Data backup Physical security Disaster recovery plan Data security
answer
data security
question
A program that replicates itself and clogs computers and networks. Virus Worm Denial-of-service attack Trojan horse
answer
worm
question
These are used by advertisers to keep track of your web activity as you move from one site to the next. Web bugs History files First-party cookies Third-party cookies
answer
third-party cookies
question
Which of the following is the most widely used wireless network encryption for home wireless networks? WEP WPE WPA WPA2
answer
WPA2
question
Small data files that are deposited on a user's hard disk when they visit a website are called _______. cookies codes cache proxies
answer
cookies
question
Which among the following is a way to shut down an ISP or website? Denial of service attack Viruses Trojan horses Worms
answer
Denial of service attack
question
A(n) _______ acts as a security buffer between a corporation's private network and all external networks. firewall password disaster recovery plan virus checker
answer
firewall
question
Which of the following is not malware? Trojan horses Viruses Worms Ad-Aware
answer
Ad-Aware
question
Corporations often use this to prevent copyright violations. Digital Millennium Copyright Act Website encryption Digital rights management (DRM) Keystroke loggers
answer
Digital rights management (DRM)
question
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return? Malicious program Internet scam Theft Data manipulation
answer
internet scam
question
Computer criminals that create and spread viruses are punished under this law. Gramm-Leach-Bliley Act Freedom of Information Act Family Educational Rights and Privacy Act Computer Fraud and Abuse Act
answer
Computer Fraud and Abuse Act
question
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person. Identity theft Auction fraud Cyberbullying Snoopware
answer
cyberbullying
question
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away" Digital Millennium Copyright Act Computer Abuse Amendments Act The Gramm-Leach-Bliley Act Computer Fraud and Abuse Act
answer
Digital Millennium Copyright Act
question
Programs used to secretly record an individual's activities on the Internet are called _______. spyware cookies sniffer programs keystroke loggers
answer
spyware
question
This is a legal concept that gives content creators the right to control use and distribution of their work. Piracy Ethics Copyright Privacy
answer
copyright
question
Which of the following is not a measure to protect computer security? Restricting access Encrypting data Copying data and storing it at a remote location Keeping the same password on all systems consistently
answer
Keeping the same password on all systems consistently
question
The most significant concerns for implementation of computer technology involve _______, security, and ethics. accuracy property privacy access
answer
privacy
question
People that collect and sell personal data are called _______. direct marketers fund-raisers information resellers government agencies
answer
information resellers
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New